Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Collapse
Brand Logo
UDS UDS: $1.87
24h: 9.20%
Trade UDS
Gate.io
Gate.io
UDS / USDT
MEXC
MEXC
UDS / USDT
WEEX
WEEX
UDS / USDT
COINSTORE
COINSTORE
UDS / USDT
Biconomy.com
Biconomy.com
UDS / USDT
BingX
BingX
UDS / USDT
XT.COM
XT.COM
UDS / USDT
Uniswap v3
Uniswap v3
UDS / USDT
PancakeSwap v3
PancakeSwap v3
UDS / USDT

Earn up to 50 UDS per post

Post in Forum to earn rewards!

Learn more
UDS Right

Spin your Wheel of Fortune!

Earn or purchase spins to test your luck. Spin the Wheel of Fortune and win amazing prizes!

Spin now
Wheel of Fortune
selector
wheel
Spin

Paired Staking

Stake $UDS
APR icon Earn up to 50% APR
NFT icon Boost earnings with NFTs
Earn icon Play, HODL & earn more
Stake $UDS
Stake $UDS
UDS Left

Buy UDS!

Buy UDS with popular exchanges! Make purchases and claim rewards!

Buy UDS
UDS Right

Post in Forum to earn rewards!

UDS Rewards
Rewards for UDS holders
Rewards for UDS holders (per post)*
  • 100 - 999 UDS: 0.05 UDS
  • 1000 - 2499 UDS: 0.10 UDS
  • 2500 - 4999 UDS: 0.5 UDS
  • 5000 - 9999 UDS: 1.5 UDS
  • 10000 - 24999 UDS: 5 UDS
  • 25000 - 49999 UDS: 10 UDS
  • 50000 - 99 999 UDS: 25 UDS
  • 100 000 UDS or more: 50 UDS
*

Rewards are credited at the end of the day. Limited to 5 payable posts per day, 50 K holders - 3 posts per day, 100K holders - 2 posts per day. Staked UDS gives additional coefficient up to X1.5

  1. Home
  2. Pulse of the market
  3. 🚨 North Korean IT Workers Infiltrate Crypto Projects via Fake IDs & Google Tools

🚨 North Korean IT Workers Infiltrate Crypto Projects via Fake IDs & Google Tools

Scheduled Pinned Locked Moved Pulse of the market
6 Posts 6 Posters 29 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
This topic has been deleted. Only users with topic management privileges can see it.
  • johnblockbusterJ Offline
    johnblockbusterJ Offline
    johnblockbuster
    wrote last edited by
    #1

    0198a647-1c9c-784f-8fa4-26839dc6f098.webp
    A small DPRK team linked to a $680K crypto hack in June has been exposed using fake identities, Google products, and freelance platforms to penetrate the Web3 industry.

    🕵️ Key findings (via @zachxbt):

    The six-person team used at least 31 fake identities with real government IDs, phone numbers, and purchased Upwork/LinkedIn accounts.

    Posed as engineers from Polygon Labs, OpenSea, and Chainlink in scripted interviews.

    Secured jobs on Upwork as blockchain devs, accessed companies using AnyDesk, VPNs, and Google tools for ops and comms.

    Monthly expenses to run the op: $1,489 (as shown in internal docs).

    Tied to $680K exploit on Favrr in June 2025 via wallet 0x78e1a.

    Used Payoneer to convert fiat to crypto.

    đź“‚ Leaked docs show:

    Interview prep docs.

    Curiosity in AI firms and ERC-20 deployment on Solana.

    Chrome profiles, Google Drive exports, and budget spreadsheets in English via translation tools.

    đź§  Why it matters:

    DPRK ops aren’t always sophisticated, just persistent.

    Lax hiring and minimal due diligence = big vulnerabilities.

    U.S. Treasury recently sanctioned multiple actors linked to similar rings.

    đź”’ Takeaway for crypto orgs:
    Stronger due diligence and better platform coordination are urgently needed.

    1 Reply Last reply
    2
    • J Offline
      J Offline
      jacson4
      wrote last edited by
      #2

      What’s striking here is how low-budget yet effective this op was — under $1.5K/month in expenses to infiltrate legitimate companies and pull off a $680K heist. That should be a massive wake-up call for Web3 teams: these aren’t elite cyberwarfare units every time, they’re small, persistent groups exploiting the weakest link — human trust. The fake LinkedIn and Upwork angles are especially worrying, because they bypass traditional “tech” defenses entirely. Even the best code audits won’t help if the attacker is inside your Slack and repo.

      1 Reply Last reply
      0
      • N Offline
        N Offline
        Nahid10
        wrote last edited by
        #3

        The bigger issue isn’t just DPRK’s tactics — it’s how many hiring pipelines in Web3 are wide open for this kind of abuse. Contract-to-hire without serious vetting, outsourced HR with no blockchain-specific security training, and zero cross-platform data sharing between LinkedIn, Upwork, and exchanges means bad actors can keep recycling identities. Until there’s industry-wide due diligence standards — identity verification, wallet history checks, and platform-to-platform alerts — we’ll keep reading the same headlines. The technology may be decentralized, but security coordination needs to be far more centralized.

        1 Reply Last reply
        0
        • M Offline
          M Offline
          Maxwell
          wrote last edited by
          #4

          This is a reminder that most breaches aren’t about elite hacking — they’re about exploiting human and process gaps. Stronger hiring due diligence should be standard in Web3

          1 Reply Last reply
          0
          • rafihasanR Offline
            rafihasanR Offline
            rafihasan
            wrote last edited by
            #5

            Posing as devs from Polygon or Chainlink shows how much trust bias exists in crypto hiring. Verification and background checks can’t be optional anymore

            1 Reply Last reply
            0
            • N Offline
              N Offline
              Nahiar806
              wrote last edited by
              #6

              $1,489/month to run an op tied to a $680K hack? That ROI is exactly why DPRK keeps trying — and why Web3 needs better cross-platform intel sharing to stop them early.

              1 Reply Last reply
              0


              Powered by NodeBB Contributors
              • First post
                Last post
              0
              • Categories
              • Recent
              • Tags
              • Popular
              • World
              • Users
              • Groups